On Wednesday, July 13, 2016 01:01:13 pm Eric Rescorla wrote:
> It's natural to pick the cipher suite first and then look for the key_share
> extension, so if, for instance, you pick a PSK-only cipher suite, then you
> wouldn't look for the key_share.

Agreed. That's why I'm ok with the current "no alternative cipher suite is 
available" qualification. If the extension never comes up, then not giving a 
specific error for it is allowed.

On Wednesday, July 13, 2016 10:43:58 am David Benjamin wrote:
> To be clear, I am not at all opposed to useful errors or strict policing of
> what the peer sends. 
[...]
> Complexity is the currency we pay for adding things.

I very much agree. Our debate hinges on risk assessment, which gets admittedly 
hard when talking about unknown future implementations. ;)

Essentially, the design philosophy I and Hubert are advocating involves 
mandatory validation of inputs by all implementations such that we focus on 
avoiding divergence from what we all agree to in the spec, rather than always 
try and use our imagination to enumerate each individual screw up that could be 
made.


Dave

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to